Pre-Summer Sale 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exams65

ExamsBrite Dumps

HCIA-Security V4.0 Exam Question and Answers

HCIA-Security V4.0 Exam

Last Update Apr 15, 2026
Total Questions : 153

We are offering FREE H12-711_V4.0 Huawei exam questions. All you do is to just go and sign up. Give your details, prepare H12-711_V4.0 free exam questions and then go for complete pool of HCIA-Security V4.0 Exam test questions that will help you more.

H12-711_V4.0 pdf

H12-711_V4.0 PDF

$36.75  $104.99
H12-711_V4.0 Engine

H12-711_V4.0 Testing Engine

$43.75  $124.99
H12-711_V4.0 PDF + Engine

H12-711_V4.0 PDF + Testing Engine

$57.75  $164.99
Questions 1

Which of the following statements is incorrect about DoS attacks?

Options:

A.  

DoS attacks use IP spoofing to prevent authorized users from connecting to the target server.

B.  

DoS attacks stop services or resource access on the target server.

C.  

DoS attack forces the target server's buffer to be full and does not receive new requests.

D.  

DoS attacks cause unrecoverable physical damage to the target server.

Discussion 0
Questions 2

In most cases, a user applies for a local certificate from a CA, and the CA approves the application and issues the certificate to the user.

Options:

A.  

TRUE

B.  

FALSE

Discussion 0
Questions 3

What is the protocol number of the GRE protocol?

Options:

A.  

47

B.  

48

C.  

46

D.  

The 50th

Discussion 0
Questions 4

Which of the following statements is incorrect about information transmission through the heartbeat link between two firewalls that work in hot standby mode?

Options:

A.  

Heartbeat packets are sent to synchronize configuration commands and status information between the two firewalls.

B.  

Heartbeat packets are periodically sent by the two firewalls to check whether the peer device is alive.

C.  

VGMP packets are sent to check the status of the peer device, so as to determine whether a switchover is required.

D.  

Configuration consistency check packets are sent to check whether key configurations of the two firewalls are consistent.

Discussion 0
Questions 5

For which of the following parameters can the packet filtering firewall filter?

Options:

A.  

Port packet payload

B.  

IP address of the port source destination

C.  

The MAC address of the source destination

D.  

Port number and protocol number of the port source

Discussion 0
Questions 6

When logging in to the web UI through HTTPS, you need to specify a local certificate issued by a CA that the web browser trusts for the HTTPS client on the device. Because the web browser can verify the local certificate, this approach avoids malicious attacks and ensures secure logins of administrators.

Options:

A.  

TRUE

B.  

FALSE

Discussion 0
Questions 7

Which of the following authentication modes are supported by AAA?

Options:

A.  

RADIUS authentication

B.  

No authentication

C.  

HWTACACS authentication

D.  

Local authentication

Discussion 0
Questions 8

Please classify the following security defenses into the correct classification.

Options:

Discussion 0
Questions 9

_____ Authentication is to configure user information (including local user's user name, password and various attributes) on the network access server. The advantage is that it is fast.[fill in the blank]*

Options:

Discussion 0
Questions 10

Which of the following characteristics does a denial-of-service attack include?

Options:

A.  

Unauthorized tampering of the mouth

B.  

Unauthorized access to the mouth

C.  

Unauthorized activation of the mouth

D.  

Unauthorized destruction of the mouth

Discussion 0
Questions 11

The trigger authentication method for firewall access user authentication does not include which of the following?

Options:

A.  

MPLS VPN

B.  

SSL VPN

C.  

IPSec VPN

D.  

L2TP VPN

Discussion 0
Questions 12

On a firewall, security policies with the permit action do not need to be configured for traffic between users in the same zone.

Options:

A.  

TRUE

B.  

FALSE

Discussion 0
Questions 13

At what layer does packet filtering technology in the firewall filter packets?

Options:

A.  

Transport layer

B.  

Network layer

C.  

Physical layer

D.  

Data link layer

Discussion 0
Questions 14

The trigger modes of the built-in Portal authentication in the firewall include pre-authentication and ____ authentication[fill in the blank]*

Options:

Discussion 0
Questions 15

In the automatic backup mode of hot standby on the second machine, which of the following sessions is backed up?

Options:

A.  

ICMP session

B.  

TCP half-connection session

C.  

Self-session to the firewall

D.  

UDP first packet session

Discussion 0
Questions 16

Database operation records can be used as ___ evidence to backtrack security events.[fill in the blank]*

Options:

Discussion 0
Questions 17

Which of the following descriptions of server authentication is correct?

Options:

A.  

The visitor sends the username and password that identifies his identity to FW through the portal authentication page, there is no password stored on F7, FT sends the username and password to a third-party authentication server, and the verification process is carried out on the authentication server.

B.  

Visitors obtain the SMS verification code through the Portal authentication page, and then enter the SMS verification code to pass the authentication.

C.  

The visitor sends the username and password that identifies his identity to the third-party authentication server, and after the authentication is passed, the third-party authentication server sends the visitor's identity information to FW.

D.  

The visitor sends the username and password that identifies them to the FW through the portal authentication page, on which the password is stored and the verification process takes place on the FW.

Discussion 0
Questions 18

Which of the following are application-layer protocols?

Options:

A.  

DNS

B.  

ARP

C.  

Telnet

D.  

HTTP

Discussion 0
Questions 19

Which of the following is not the default security zone of the firewall

Options:

A.  

untrust trust

B.  

trust zone

C.  

dmz zone

D.  

isp zone)

Discussion 0
Questions 20

3-tuple NAT allows external devices to proactively access internal PCs through translated addresses and ports. Even if no security policy is configured on the firewall, the firewall allows such access packets to pass through.

Options:

A.  

TRUE

B.  

FALSE

Discussion 0
Questions 21

Which of the following statements are correct about the PKI system structure?

Options:

A.  

A PKI entity is an end user of PKI products or services. It can be an individual, an organization, a device such as a router or firewall, or a process running on a computer.

B.  

CAs are classified into the root CA and subordinate CAs according to the hierarchy of CAs.

C.  

A CA is a trusted entity that issues and manages digital certificates.

D.  

A PKI system consists of three parts: entity, certificate authority, and certificate registration authority.

Discussion 0
Questions 22

Digital envelope technology means that the sender uses the receiver's public key to encrypt the data, and then sends the ciphertext to the receiver

Options:

A.  

TRUE

B.  

FALSE

Discussion 0
Questions 23

Which of the following are antivirus response actions of the firewall?

Options:

A.  

Block

B.  

Alert

C.  

Delete attachment

D.  

Declare

Discussion 0
Questions 24

When logging in to the web UI through HTTPS, you need to specify a local certificate issued by a CA that the web browser trusts for the HTTPS client on the device. Because the web browser can verify the local certificate, this approach avoids malicious attacks and ensures secure logins of administrators.

Options:

A.  

TRUE

B.  

FALSE

Discussion 0
Questions 25

In the TCP/P protocol core, which of the following protocols works at the application layer?

Options:

A.  

IGMP

B.  

ICMP

C.  

RIP

D.  

ARP

Discussion 0
Questions 26

Please match the following information security risks to information security incidents one by one.[fill in the blank]*

physical security risk Enterprise server permissions are loosely set

Information Security Management Risk Infected Panda Burning Incense

Information Access Risk Fire destroyed equipment in computer room

application risk Talk to people about leaking company secrets

Options:

Discussion 0
Questions 27

DES is a stream encryption algorithm, because the cipher capacity is only 56 bits, so it is not enough to deal with the weakness of insufficient security, and later 3DES was proposed.

Options:

A.  

TRUE

B.  

FALSE

Discussion 0
Questions 28

The following description of the construction of a digital certificate, which item is wrong

Options:

A.  

The name of the device that issued the certificate can be different from the subject name in the issuer certificate.

B.  

The structure of the certificate follows the specification of the X.509 v3 version.

C.  

The simplest certificate consists of a public key, a name, and a digital signature from a certificate authority.

D.  

The issuer signs the certificate information with the private key.

Discussion 0
Questions 29

Which of the following is not the matching mode of the firewall security protection whitelist rules?

Options:

A.  

Prefix matching

B.  

Fuzzy matching

C.  

Keyword matching

D.  

Suffix matching

Discussion 0
Questions 30

Which of the following problems cannot be solved using PKI?

Options:

A.  

The network is congested due to heavy traffic. As a result, the server cannot provide services properly.

B.  

The transaction parties cannot verify the identities of each other.

C.  

Data may be eavesdropped and tampered with during transmission, and information security cannot be ensured.

D.  

No paper receipt is used in transaction, making arbitration difficult.

Discussion 0
Questions 31

As shown in the figure, nat server global202.106.1.1 inside10.10.1.1 is configured on the firewall. Which of the following is the correct configuration for interzone rules?

Options:

A.  

rule name c. source-zone untrust. destination-zone trust. destination-address 202.106.1.132, action permit

B.  

rule name d, source- zone untrust. destination- zone trust. destination- address10.l0.1.1 32, action permit

C.  

rule name b, source- zone untrust, destination- zone trust, source- address10.10.1.1 32, action permit

D.  

rule name b, source-zone untrust, destination-zone trust, source-address202.106.l.1 32, action permit

Discussion 0
Questions 32

Which type of NAT translates both addresses and port numbers and uses the public IP address of the outbound interface as the post-NAT address?

Options:

A.  

NAPT

B.  

Easy IP

C.  

3-tuple NAT

D.  

NAT No-PAT

Discussion 0
Questions 33

Both digital envelopes and digital signatures guarantee data security and verify the origin of data.

Options:

A.  

TRUE

B.  

FALSE

Discussion 0
Questions 34

Which layer of data packets does a packet filtering firewall check?

Options:

A.  

Application layer

B.  

Physical layer

C.  

Network layer

D.  

Data link layer

Discussion 0
Questions 35

Match each of the following application layer service protocols with the correct transport layer protocols and port numbers.

Options:

Discussion 0
Questions 36

Which of the following statements is correct about security zones on a Huawei firewall?

Options:

A.  

An interface on a firewall can belong to multiple zones.

B.  

The default zones on a firewall can be deleted.

C.  

Different security zones on a firewall have the same default security level.

D.  

Different interfaces on a firewall can be in the same zone.

Discussion 0
Questions 37

Which of the following are the default zones of Huawei firewalls?

Options:

A.  

Untrust

B.  

Local

C.  

DMZ

D.  

Trust

Discussion 0
Questions 38

Which of the following statements are correct about IKE-based SA establishment in IPsec?

Options:

A.  

SAs are valid permanently.

B.  

IKE-based SA establishment applies to medium- and large-sized networks.

C.  

The SPI value is generated randomly.

D.  

Keys are generated using the DH algorithm and dynamically updated.

Discussion 0
Questions 39

Certificates saved in DER format may or may not contain a private key.

Options:

A.  

TRUE

B.  

FALSE

Discussion 0
Questions 40

Which of the following descriptions about the heartbeat interface is wrong ( )?

Options:

A.  

It is recommended to configure at least two heartbeat interfaces. - One heartbeat interface is used as the master, and the other heartbeat interface is used as the backup.

B.  

The interface MTU value is greater than 1500 and cannot be used as a heartbeat interface

C.  

The connection method of the heartbeat interface can be directly connected, or it can be connected through a switch or router

D.  

MGMT interface (Gigabi tEtherneto/0/0) cannot be used as heartbeat interface

Discussion 0
Questions 41

In the Linux system, which of the following is the command to query the P address information?

Options:

A.  

ifconfig)

B.  

display ip interface brief

C.  

ipconfig

D.  

display ip

Discussion 0
Questions 42

In asymmetric encryption algorithms, only public keys can be used to encrypt data, and private keys are used to decrypt data. This process is irreversible.

Options:

A.  

TRUE

B.  

FALSE

Discussion 0
Questions 43

Please order the following steps in the PKI life cycle correctly, 1. Issued, 2. storage, 3. Update, 4. verify[fill in the blank]*

Options:

Discussion 0
Questions 44

IPSec VPN uses an asymmetric algorithm to calculate the ___ key to encrypt data packets.[fill in the blank]

Options:

Discussion 0
Questions 45

Which of the following types of malicious code on your computer includes?

Options:

A.  

Oral virus

B.  

Trojan horses

C.  

Port SQL injection

D.  

Oral spyware

Discussion 0